Position Summary

Campus: Auckland Park Kingsway Campus
Remuneration: Market Related
EE position: EE
Level: Skilled

Introduction

The University of Johannesburg (UJ) is a vibrant and cosmopolitan university, anchored in Africa and driven by a powerful strategy focused on attaining global excellence and stature (GES). With an emphasis on independent thinking, sustainable development, and strategic partnerships, UJ is an international university of choice. The University is guided by the Vice-Chancellor’s vision of “Positioning UJ in the Fourth Industrial Revolution (4IR) for societal impact in the context of the changing social, political, and economic fortunes of Africa”.

Job description

Reporting to the Chief Information Officer within the Information and Communications Systems (ICS) Department, the Director of Information Security Management will be responsible for developing and implementing security strategies, policies and procedures to protect the organisation's data, systems and technology infrastructure from cyber threats and vulnerabilities. Upon joining the Department, you will:
  • Be situated at the Auckland Park Kingsway Campus, but not excluded from supporting all campuses
  • Fulfil management, leadership, technical and administrative roles in the Department
 
Responsibilities:
 
If you join the Department, you will:
  • Establish an Information Security Management and Protection Framework for developing and implementing an effective enterprise-wide Information Security Governance and Strategy Programme.
  • Define a Cybersecurity strategy and operating model aligned with UJ business objectives with a clear, tracked and measurable cybersecurity plan.
  • Assume responsibility for UJ's information security and compliance programme, building and leading a high-performing cybersecurity and compliance team and advisory consultancy to business and IT domain leaders.
  • Manage the day-to-day activities, including policies, procedures, training and communication regarding the Information Governance Programme.
  • Perform regular IT Security Maturity Assessments for the respective UJ IT areas, including people, processes and technologies.
  • Lead the security documentation process to ensure progress and auditability.
  • Lead the implementation of a secure system development life cycle.
  • Develop, implement and maintain IT security policies, procedures, standards and practices to ensure conformance with generally accepted practices and mandatory legislation / regulations.
  • Conduct information assets security risk assessment.
  • Lead the implementation and monitoring of information and data quality standards, policies and procedures.
  • Oversee the selection, deployment and validation of IT Information security controls to ensure that security and compliance requirements are met.
  • Ensure that information security threats are identified, detected, responded to, recovered from and followed up on.
  • Ensure security programmes compliancy with relevant laws, regulations and policies to minimise or eliminate risk and audit findings.
  • Integrate an Information and Cyber Security Risk Management Framework.
  • Present regular reports to UJ executives and auditors on the cybersecurity status of the organisation.
  • Collaborate with key stakeholders to proactively identify local issues and areas of risk that impact data quality, availability, and confidentiality. Implement preventive measures and remedial action when required.
  • Conduct security audits to identify gaps and implement controls to mitigate risks.

Minimum requirements

  • Degree or any relevant qualification (NQF 8)
  • 5 to 8 years' of management experience in an Information Security Management
  • Information security, project management and IT service management experience
  • People management experience
  • Stakeholder management experience
  • Outsourced services and management of commercial partners
  • Managing strategic change in a dynamic operating environment
  • Translating broad business needs and understanding the key drivers of enterprise applications
  • Risk assessment and mitigation risk-related industry-standard qualifications such as CISA, CISM or CISSP
 
Competencies and Behavioural Attributes:
 
Skills:
Essential:
 
  • Good interpersonal and communication skills (verbal and written).
  • Ability to maintain sound human relations and transfer skills and knowledge.
  • Strong decision making and budget control skills.
  • Strong Risk management and Cyber security awareness.
  • IT Policies and Procedures.
  • Collaborating with business managers to determine and deliver value adding IT solutions.
  • Ability to manage a multi technology technical support team.
  • Vendor management.
  • Knowledge of the latest Information security technologies.
  • Firewall standards and protocols.
 
Desirable:
  • Project Management
  • Contract negotiations
 
Competencies:
 
  • Working together
    • Demonstrates and Proactively enables and encourages teamwork.
  • Communication & influencing
    • Proactively builds relationships and generates effective discussion and mutual support for plans and ideas.
  • Managing Knowledge
    • Proactively seeks out new knowledge sources. Uses and shares knowledge effectively.
  • Striving for excellence
    • Sets and measures challenging objectives for self and others.
    • Gives evidence-based feedback that helps others to excel.
  • Managing Resources
    • Finds creative and innovative ways to allocate and utilize resources.
  • Managing People
    • Builds an effective team with clear objectives; allocates work appropriately; deals with poor performance and recognises success.
  • Developing People
    • Helps team members to create and implement clear development plans that meet own and ICS short and long term goals.
  • Leading for the Future
    • Builds confidence and excitement in ICS work and vision, both internally and externally.
  • Thinking Strategically
    • Decisive, takes a big picture view, coaches others to consider long-term impact, and to consult within and beyond ICS.
  • Delivering Results
    • Plans and manages appropriately; holds self and team accountable for achieving goals.
 
Enquiries:
 
Enquiries regarding the job content: Ms Maletsema Phofu on Tel: (011) 559 1586
Enquiries regarding remuneration & benefits: Ms Chandi Hira (HCM Business Partner) on Tel: (011) 559 4439

 

Your application, comprising of a detailed Curriculum Vitae as well as the names and full contact details (including telephone numbers and e-mail addresses) of at least three traceable and credible referees must be uploaded before or on the closing date of the advertised post. Please also attach the following: a copy of your highest academic qualification, proof of registration with professional bodies you might belong to and if applying for an academic position, a list of accredited research output and/ or a portfolio of your creative output.

If you require technical support / assistance on the UJ e-recruitment website, please contact our service provider PNET on the following contact details: 0861 227337/010 140 3099 or email ujsupport@pnet.co.za.

Candidates may be subjected to appropriate psychometric testing and other selection instruments.

In conjunction to merit on the basis of qualifications, experience and proven achievements the University of Johannesburg is committed to providing equal employment opportunities for persons with disabilities and those individuals from the historically disadvantaged groups. As necessitated by operational requirements the University reserves the right not to make an appointment to positions advertised. If you have not received a response from the University within 8 weeks of the closing date, you should assume that your application has been unsuccessful.

 

Our website uses cookies so that we can provide you with the best user experience. By continuing to use our website, you agree to our use of cookies.